{"id":99385,"date":"2025-07-28T12:48:11","date_gmt":"2025-07-28T12:48:11","guid":{"rendered":"https:\/\/www.europesays.com\/us\/99385\/"},"modified":"2025-07-28T12:48:11","modified_gmt":"2025-07-28T12:48:11","slug":"scattered-spider-targeting-vmware-hypervisors","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/99385\/","title":{"rendered":"Scattered Spider targeting VMware hypervisors"},"content":{"rendered":"<p>        Attacks have affected US government, retail and aviation<\/p>\n<p>            <img decoding=\"async\" loading=\"lazy\" alt=\"\" src=\".\/media_1d6c08fed2f9dd7cb52e836ffbd4875868636370c.jpg?width=750&amp;format=jpg&amp;optimize=medium\" width=\"706\" height=\"494\"\/><\/p>\n<p><strong>Scattered Spider, the hacking collective behind attacks on <a href=\"https:\/\/www.computing.co.uk\/news\/2025\/security\/m-s-cyberattack-linked-to-scattered-spider?itc=refresh\" target=\"_blank\" rel=\"noopener\">Marks &amp; Spencer<\/a>, <a href=\"https:\/\/www.computing.co.uk\/news\/2025\/security\/scattered-spider-targets-aviation?itc=refresh\" target=\"_blank\" rel=\"noopener\">Hawaiian Airlines and WestJet<\/a>, is \u201caggressively\u201d targeting VMware virtualised environments.<\/strong><\/p>\n<p>Google\u2019s Threat Intelligence Group (GTIG) <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/defending-vsphere-from-unc3944\/\" target=\"_blank\" rel=\"noopener\">says<\/a> UNC3944, a group that overlaps with Scattered Spider, is attacking VMware ESXi hypervisors at companies in the retail, airline, transportation and insurance sectors.<\/p>\n<p>Although GTIG specifically discusses attacks in the USA cyber campaigns tend to spread quickly, so EU and UK customers should also be vigilant.<\/p>\n<p>Scattered Spider\u2019s modus operandi is to start attacks with social engineering, and that is also the case in this new campaign.<\/p>\n<p>&#8220;The actors are aggressive, creative, and particularly skilled at using social engineering to bypass even mature security programmes,\u201d said GTIG. \u201cTheir attacks are not opportunistic but are precise, campaign-driven operations aimed at an organisation&#8217;s most critical systems and data.\u201d<\/p>\n<p>The attack begins with a call to a company\u2019s IT service desk, where the attacker poses as a specific employee. Their aim is to convince the agent to change that employee\u2019s Active Directory password to obtain initial access.<\/p>\n<p>From there they scan IT documentation for the names of high-value targets like vSphere administrators, working their way inward in an attempt to obtain access to the company&#8217;s VMware vCenter Server Appliance (vCSA).<\/p>\n<p>The vCSA is a virtual machine that can be used to manage VMware vSphere environments, including the ESXi hypervisor.<\/p>\n<p>If they aren\u2019t stopped, the attackers can gain nearly full control of a company\u2019s virtual machines \u2013 including wiping backup jobs and repositories \u2013 and deliver ransomware to encrypt all VM files they find.<\/p>\n<p>Image<\/p>\n<p>                <img decoding=\"async\" loading=\"lazy\" alt=\"\" src=\".\/media_15e6ad03a99b4b78d821d02e410aaab7008292054.png?width=750&amp;format=png&amp;optimize=medium\" width=\"1600\" height=\"617\"\/><\/p>\n<p>Description<\/p>\n<p>The typical Scattered Spider attack chain. Source: Google<\/p>\n<p>Without exploiting software vulnerabilities, Scattered Spider attackers can obtain \u201can unprecedented level of control over an entire virtualised environment, allowing them to bypass many traditional in-guest security controls,\u201d a Google spokesperson told <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/scattered-spider-is-running-a-vmware-esxi-hacking-spree\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a>.<\/p>\n<p>Google also called out the group\u2019s \u201cextreme velocity\u201d: the whole attack chain can take place over just a few hours.<\/p>\n<p>&#8220;UNC3944&#8217;s playbook requires a fundamental shift in defensive strategy, moving from EDR-based threat hunting to proactive, infrastructure-centric defence.<\/p>\n<p>\u201cThis threat differs from traditional Windows ransomware in two ways: speed and stealth.&#8221;<\/p>\n<p>More and more ransomware groups have begun targeting ESXi hypervisors, Google notes. This may be because organisations rarely have a complete understanding of their VMware infrastructure, making it a weak point.<\/p>\n<p>To help with that, GTIG advises <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/defending-vsphere-from-unc3944\/#:~:text=The%20Three%2DPillar%20Defense%3A%20A%20Fortified%20Strategy\" target=\"_blank\" rel=\"noopener\">the following steps<\/a>:<\/p>\n<ul>\n<li>Proactive hardening of defences: Build for centralised access, enable vSphere lockdown mode and enforce execInstalledOnly.<\/li>\n<li>Identity and architectural integrity: Enforce MFA, isolate critical infrastructure and avoid authentication loops.<\/li>\n<li>Advanced detection and recovery: Build alerts that detect attempts to bypass previous hardening controls, centralise and monitor key logs, and focus on high-fidelity alerts.<\/li>\n<\/ul>\n<p>\u201cThe threat is immediate, and the attack chain is proven,\u201d writes Google. \u201cMandiant has observed that the successful hypervisor-level tactics leveraged by groups like UNC3944 are no longer exclusive; these same TTPs are now being actively adopted by other ransomware groups. This proliferation turns a specialised threat into a mainstream attack vector, making the time to act now.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"Attacks have affected US government, retail and aviation Scattered Spider, the hacking collective behind attacks on Marks &amp;&hellip;\n","protected":false},"author":3,"featured_media":99386,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[745,734,2722,22356,22355,158,67,132,68,65011,46990],"class_list":{"0":"post-99385","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computing","8":"tag-computing","9":"tag-cybersecurity","10":"tag-google","11":"tag-ransomware","12":"tag-scattered-spider","13":"tag-technology","14":"tag-united-states","15":"tag-unitedstates","16":"tag-us","17":"tag-virtual-machine","18":"tag-vmware"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/114930942388004819","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/99385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=99385"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/99385\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/99386"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=99385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=99385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=99385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}